First published: Wed Jun 03 2020(Updated: )
Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
Credit: bressers@elastic.co bressers@elastic.co bressers@elastic.co
Affected Software | Affected Version | How to fix |
---|---|---|
Elastic Elastic Cloud On Kubernetes | <1.1.0 | |
go/github.com/elastic/cloud-on-k8s | <1.1.0 | 1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7010 is a vulnerability in Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 that allows an attacker to more easily brute force Elasticsearch credentials.
CVE-2020-7010 has a severity rating of high, with a CVSS score of 7.5.
CVE-2020-7010 impacts ECK versions prior to 1.1.0 by generating passwords using a weak random number generator, making it easier for attackers to brute force Elasticsearch credentials.
To mitigate the vulnerability, it is recommended to upgrade Elastic Cloud on Kubernetes (ECK) to version 1.1.0 or higher.
For more information about CVE-2020-7010, you can refer to the official security advisory on the Elastic website.